0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 5 years have passed since last update.

[漏洞通告]CVE-2020-2555/Oracle Coherence&WebLogic反序列化远程代码执行漏洞

Last updated at Posted at 2020-03-06

漏洞描述

近日,亚信安全网络攻防实验室监测到1月份被Oracle修复的基于T3协议触发的漏洞(CVE-2020-2555)细节在ZDI被公开.Oracle Coherence为Oracle融合中间件中的产品,是业界领先的内存数据网格解决方案,它能为公司和组织提供对常用数据的快速访问。在WebLogic 12c及以上版本中默认集成到WebLogic安装包中.Oracle Coherence中的反序列化远程代码执行漏洞允许未经身份验证的攻击者通过精心构造的T3网络协议请求进行攻击.成功利用该漏洞的攻击者可以在目标主机上执行任意OS命令,严重危害服务器安全.

漏洞编号

CVE-2020-2555

漏洞威胁等级

高危

影响范围

Oracle Coherence 3.7.1.17
Oracle Coherence&WebLogic 12.1.3.0.0
Oracle Coherence&WebLogic 12.2.1.3.0
Oracle Coherence&WebLogic 12.2.1.4.0

漏洞验证

选用WebLogic 12.1.3为靶机进行验证

image.png

修复建议

安装更新补丁即可
https://www.oracle.com/security-alerts/cpujan2020.html

时间轴

[0] 2020/03/05 Sivathmican Sivakumaran在ZDI公开漏洞细节
[1] 2020/03/06 亚信安全网络攻防实验室分析&复现该漏洞并发布漏洞通告

鸣谢

感谢一起研究的以下小伙伴

Qianxin-Lufei/Ntears、
afanti

Reference

https://www.zerodayinitiative.com/blog/2020/3/5/cve-2020-2555-rce-through-a-deserialization-bug-in-oracles-weblogic-server
https://mp.weixin.qq.com/s/nzKDO77tW-WVuPsgy3vrzg

0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?